Subject: Re: widespread IKE bugs
To: Dries Schellekens <gwyllion@ulyssis.org>
From: Steven M. Bellovin <smb@cs.columbia.edu>
List: tech-security
Date: 11/15/2005 07:50:09
In message <4379D670.5060200@ulyssis.org>, Dries Schellekens writes:
>Steven M. Bellovin wrote:
>
>> Per http://news.com.com/VPN+flaw+threatens+Internet+traffic/2100-1002_3-5951
>916.html
>> the good folks at University of Oulu have found flaws in many different
>> implementations of IKE. OpenSWAN is one of the affected code bases.
>> Does anyone know if NetBSD or KAME IKE are vulnerable? (The test suite
>> can be downloaded from http://www.ee.oulu.fi/research/ouspg/protos/testing/c
>09/isakmp/
>> )
>
>It is being looked at by the ipsec-tools people:
>http://sourceforge.net/mailarchive/forum.php?thread_id=8967088&forum_id=32000
Good.
>
>OpenBSD has audited their IKE parsing code early 2004 and thus is not
>vunerable:
>http://marc.theaimsgroup.com/?l=openbsd-misc&m=113199092403670&w=2
>
I don't believe in audits -- well-crafted tools are much better....
Thanks.
--Steven M. Bellovin, http://www.cs.columbia.edu/~smb